Analysis
-
max time kernel
18s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 05:20
Static task
static1
Behavioral task
behavioral1
Sample
1b8e5ffa24aacacb887ec486ad31486589472253b5de6278c19c06e9daffc53a.exe
Resource
win7-20220812-en
General
-
Target
1b8e5ffa24aacacb887ec486ad31486589472253b5de6278c19c06e9daffc53a.exe
-
Size
770KB
-
MD5
9a8412ae8a129a60a294548aa291168f
-
SHA1
1246db1fce69ceb5dbbb32a100d4c7d91dc6c606
-
SHA256
1b8e5ffa24aacacb887ec486ad31486589472253b5de6278c19c06e9daffc53a
-
SHA512
38a5f5370e320da448568733c103b83e9129a8fcb605544edef632d578d309645e749bf727dcbc6319b0789e115f0764a5125101092144dad39386935e81bc41
-
SSDEEP
12288:h1OgLdaOg+f65f+YOfY0bU5phYwX6nK3LbbSLkUGL:h1OYdaOg+C5fz+YRUwXV3Lbu4DL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1912 qQPqLdNTz63XJiQ.exe -
Loads dropped DLL 1 IoCs
pid Process 1904 1b8e5ffa24aacacb887ec486ad31486589472253b5de6278c19c06e9daffc53a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\lbfehkoinhhcknnbdgnnmjhiladcgbol\142\manifest.json qQPqLdNTz63XJiQ.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\lbfehkoinhhcknnbdgnnmjhiladcgbol\142\manifest.json qQPqLdNTz63XJiQ.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\lbfehkoinhhcknnbdgnnmjhiladcgbol\142\manifest.json qQPqLdNTz63XJiQ.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1912 1904 1b8e5ffa24aacacb887ec486ad31486589472253b5de6278c19c06e9daffc53a.exe 27 PID 1904 wrote to memory of 1912 1904 1b8e5ffa24aacacb887ec486ad31486589472253b5de6278c19c06e9daffc53a.exe 27 PID 1904 wrote to memory of 1912 1904 1b8e5ffa24aacacb887ec486ad31486589472253b5de6278c19c06e9daffc53a.exe 27 PID 1904 wrote to memory of 1912 1904 1b8e5ffa24aacacb887ec486ad31486589472253b5de6278c19c06e9daffc53a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b8e5ffa24aacacb887ec486ad31486589472253b5de6278c19c06e9daffc53a.exe"C:\Users\Admin\AppData\Local\Temp\1b8e5ffa24aacacb887ec486ad31486589472253b5de6278c19c06e9daffc53a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\7zS6A29.tmp\qQPqLdNTz63XJiQ.exe.\qQPqLdNTz63XJiQ.exe2⤵
- Executes dropped EXE
- Drops Chrome extension
PID:1912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD509a1ea73a963ed970dbff36ef4806414
SHA1f7d50ab339f6c2938905542891a2214036d736bd
SHA256b0d6e220797cc31c39107ab844a67a68e80ff0ccf54b512ff0a4bf725b54d5d8
SHA51213ab43f0b635a28742745fd9a3313ef031a05dde3e0fb5e2c65933a9d4fe47ffd9ad04a36c86391362eb45c63d30795db56d525fec8d288e036dfd6f023b039a
-
Filesize
138B
MD53026b0ad6d0afbb764a8a27343b3939f
SHA1b5d2d5e95c175ec0f99064f9fec624dfdea9e5af
SHA25678d4139b86a3b6d4120a2cc842b297836a7105e88e31c0024b70509d75a3e4fe
SHA5125f41b806a9609f10cb74843e37df8f83a0ce3a4486bc6e7a290565f4e4f0332255c535066a804ab3446c033e5675cc39ea12d075c52ad862f3f91d4bb7c79cbf
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
598B
MD5ed6d4b645b514c39d696508801f63c96
SHA1d753e98324d3777f21c0a13934431a95f2920571
SHA25688d596d1a098d6909bc176bb765107a6e4fb20ca512eeff12ee6e345065e2ccc
SHA5125af54b0b72c713db389a5a8e74a2754fc83d051778b0f4f8745bfd3c548398bf3571ed5154079e84c8e43a570cecaa46fe1002e7db3603222e583085949b3995
-
Filesize
1KB
MD5aacb69a9f3a35c71d000bce6e1df03c4
SHA13c02946b2e8416cf1db1f7e79f40661e3e9bf20b
SHA25636d733752594d2e00368b1b396c34f83fea34238e5b63995148b2c33baef2193
SHA5124ad26829675f96fb5fd6acdef05aeed9a3fe3edafb8f938d83ea333124430d07eb613b5219796822baceec70c5dcda85b54a1f74b0c6804b1b89bf47e551af69
-
Filesize
623KB
MD53b3e9f85b1e1d1defb4813cb1676b553
SHA117a064e28b670d6d4e579ac078a81e7334704b58
SHA25626fc2e717907241142895bb38734755ebb1ca82f1d23f48e09ec0d75cd4ad381
SHA5120f7d3df630b73820490a0d767707c69f5cbb94265b67a202c6f652e601ba970d1257583cf6082aa9fea97b10e7c0a40d0ac3947599602964b14a492c7452da36
-
Filesize
623KB
MD53b3e9f85b1e1d1defb4813cb1676b553
SHA117a064e28b670d6d4e579ac078a81e7334704b58
SHA25626fc2e717907241142895bb38734755ebb1ca82f1d23f48e09ec0d75cd4ad381
SHA5120f7d3df630b73820490a0d767707c69f5cbb94265b67a202c6f652e601ba970d1257583cf6082aa9fea97b10e7c0a40d0ac3947599602964b14a492c7452da36